3C- A Provably Secure Pseudorandom Function and Message Authentication Code.A New mode of operation for Cryptographic Hash Function
暂无分享,去创建一个
[1] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[2] Michael Szydlo,et al. Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing , 2006, CT-RSA.
[3] Bart Preneel,et al. MDx-MAC and Building Fast MACs from Hash Functions , 1995, CRYPTO.
[4] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[5] Charanjit S. Jutla,et al. Is SHA-1 conceptually sound? , 2005, IACR Cryptol. ePrint Arch..
[6] Ivan Damgård,et al. A Design Principle for Hash Functions , 1989, CRYPTO.
[7] Charanjit S. Jutla,et al. A Simple and Provably Good Code for SHA Message Expansion , 2005, IACR Cryptol. ePrint Arch..
[8] Hugo Krawczyk,et al. Keying Hash Functions for Message Authentication , 1996, CRYPTO.
[9] Bruce Schneier,et al. Second Preimages on n-bit Hash Functions for Much Less than 2n Work , 2005, IACR Cryptol. ePrint Arch..
[10] Mihir Bellare,et al. The Security of the Cipher Block Chaining Message Authentication Code , 2000, J. Comput. Syst. Sci..
[11] William Millan,et al. Some thoughts on Collision Attacks in the Hash Functions MD5, SHA-0 and SHA-1 , 2005, IACR Cryptol. ePrint Arch..
[12] Antoine Joux,et al. Collisions of SHA-0 and Reduced SHA-1 , 2005, EUROCRYPT.
[13] Xiaoyun Wang,et al. How to Break MD5 and Other Hash Functions , 2005, EUROCRYPT.
[14] Stefan Lucks,et al. A Failure-Friendly Design Principle for Hash Functions , 2005, ASIACRYPT.
[15] Bart Preneel,et al. On the Security of Iterated Message Authentication Codes , 1999, IEEE Trans. Inf. Theory.
[16] Silvio Micali,et al. On the Cryptographic Applications of Random Functions , 1984, CRYPTO.
[17] Jean-Sébastien Coron,et al. Merkle-Damgård Revisited: How to Construct a Hash Function , 2005, CRYPTO.
[18] Antoine Joux,et al. Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions , 2004, CRYPTO.
[19] Xiaoyun Wang,et al. Finding Collisions in the Full SHA-1 , 2005, CRYPTO.
[20] Bart Preneel,et al. On the Security of Two MAC Algorithms , 1996, EUROCRYPT.
[21] Ralph C. Merkle,et al. One Way Hash Functions and DES , 1989, CRYPTO.
[22] Pieter Retief Kasselman,et al. Analysis and design of cryptographic hash functions , 1999 .
[23] Hugo Krawczyk,et al. Pseudorandom functions revisited: the cascade construction and its concrete security , 1996, Proceedings of 37th Conference on Foundations of Computer Science.